Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 00:42 UTC
Behavioral task
behavioral1
Sample
d4c7593d7fbcb92ff13045613c48e4cd.exe
Resource
win7-20240221-en
General
-
Target
d4c7593d7fbcb92ff13045613c48e4cd.exe
-
Size
191KB
-
MD5
d4c7593d7fbcb92ff13045613c48e4cd
-
SHA1
f1d4e5e9467d9f2f895e699ec02c1b60616cda31
-
SHA256
fb66ca74d8bfa137682aa994a89b7a0889467a3013f404b981617b5ff2aaa7db
-
SHA512
d378a7a698cf8bdfedc177e47a68534c0f3cf44f652dc0d7fa6f419066b3e4d332f4322831168173d16275fe3c60dddd82059644d1e9d63966ae3636213688a5
-
SSDEEP
3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1v7:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bg
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral2/memory/3160-0-0x0000000000400000-0x000000000056B000-memory.dmp upx behavioral2/memory/3160-72-0x0000000000400000-0x000000000056B000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d4c7593d7fbcb92ff13045613c48e4cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 142567.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 3496 msedge.exe 3496 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3496 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 90 PID 3160 wrote to memory of 3496 3160 d4c7593d7fbcb92ff13045613c48e4cd.exe 90 PID 3496 wrote to memory of 3456 3496 msedge.exe 91 PID 3496 wrote to memory of 3456 3496 msedge.exe 91 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 732 3496 msedge.exe 94 PID 3496 wrote to memory of 4776 3496 msedge.exe 95 PID 3496 wrote to memory of 4776 3496 msedge.exe 95 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96 PID 3496 wrote to memory of 4352 3496 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c7593d7fbcb92ff13045613c48e4cd.exe"C:\Users\Admin\AppData\Local\Temp\d4c7593d7fbcb92ff13045613c48e4cd.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a22⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff971a346f8,0x7ff971a34708,0x7ff971a347183⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:13⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4136 /prefetch:83⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:13⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:83⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6320 /prefetch:83⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:13⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:13⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17654867568688649362,11472313779120039897,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.fenomen-games.comIN AResponsewww.fenomen-games.comIN A159.65.253.100
-
GEThttp://www.fenomen-games.com/downloader/start4.htm?subscribe=1d4c7593d7fbcb92ff13045613c48e4cd.exeRemote address:159.65.253.100:80RequestGET /downloader/start4.htm?subscribe=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.fenomen-games.com
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Date: Tue, 19 Mar 2024 00:17:15 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request100.253.65.159.in-addr.arpaIN PTRResponse100.253.65.159.in-addr.arpaIN PTRfenomen-gamescom
-
Remote address:8.8.8.8:53Requestwww.bigfishgames.comIN AResponsewww.bigfishgames.comIN CNAMEcdn.adobeaemcloud.comcdn.adobeaemcloud.comIN CNAMEadobe-aem.map.fastly.netadobe-aem.map.fastly.netIN A151.101.3.10adobe-aem.map.fastly.netIN A151.101.67.10adobe-aem.map.fastly.netIN A151.101.131.10adobe-aem.map.fastly.netIN A151.101.195.10
-
GEThttp://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2msedge.exeRemote address:151.101.3.10:80RequestGET /download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2 HTTP/1.1
Host: www.bigfishgames.com
Connection: keep-alive
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Length: 0
Retry-After: 0
Location: https://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2
Accept-Ranges: bytes
Date: Tue, 19 Mar 2024 00:43:00 GMT
Strict-Transport-Security: max-age=31557600
X-Served-By: cache-lcy-eglc8600061-LCY
X-Cache: HIT
X-Timer: S1710808980.329844,VS0,VE1
-
GEThttps://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2msedge.exeRemote address:151.101.3.10:443RequestGET /download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2 HTTP/2.0
host: www.bigfishgames.com
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 302
p3p: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
expires: Thu, 19 Nov 1981 08:52:00 GMT
cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma: no-cache
location: https://downloads.bigfishgames.com/mystery-case-files-ravenhearst_s1_l1_gF1331T1L1_d3305658939.exe?gameWID=F1331T1L1&downloadID=3305658939&siteID=1&langID=1&type=gminstaller
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains; preload
content-type: text/html; charset=UTF-8
set-cookie: mkt_code=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: mkt_code=bfgdefault; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=af628d3a27a2; expires=Mon, 17-Jun-2024 00:43:00 GMT; Max-Age=7776000; path=/; domain=.bigfishgames.com; secure
set-cookie: mkt_code=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: mkt_code=bfgdefault; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=af628d3a27a2; expires=Mon, 17-Jun-2024 00:43:01 GMT; Max-Age=7776000; path=/; domain=.bigfishgames.com; secure
set-cookie: mkt_code=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: mkt_code=bfgdefault; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/; domain=.bigfishgames.com; secure
set-cookie: afsrc=af628d3a27a2; expires=Mon, 17-Jun-2024 00:43:01 GMT; Max-Age=7776000; path=/; domain=.bigfishgames.com; secure
set-cookie: PHPSESSID=4htbgsisqo0umc3r4d7bau5jp1; path=/
accept-ranges: bytes
date: Tue, 19 Mar 2024 00:43:01 GMT
set-cookie: affinity="bdf35a33fc85da7e"; Path=/; HttpOnly
x-served-by: cache-lcy-eglc8600064-LCY
x-cache: MISS
x-timer: S1710808981.843599,VS0,VS0,VE482
content-length: 0
-
Remote address:8.8.8.8:53Request10.3.101.151.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.179.17.96.in-addr.arpaIN PTRResponse45.179.17.96.in-addr.arpaIN PTRa96-17-179-45deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestdownloads.bigfishgames.comIN AResponsedownloads.bigfishgames.comIN A34.149.211.229
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://downloads.bigfishgames.com/mystery-case-files-ravenhearst_s1_l1_gF1331T1L1_d3305658939.exe?gameWID=F1331T1L1&downloadID=3305658939&siteID=1&langID=1&type=gminstallermsedge.exeRemote address:34.149.211.229:443RequestGET /mystery-case-files-ravenhearst_s1_l1_gF1331T1L1_d3305658939.exe?gameWID=F1331T1L1&downloadID=3305658939&siteID=1&langID=1&type=gminstaller HTTP/2.0
host: downloads.bigfishgames.com
dnt: 1
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
cookie: mkt_code=bfgdefault
cookie: afsrc=af628d3a27a2
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=30F269C166A564400B267D86678265CE; domain=.bing.com; expires=Sun, 13-Apr-2025 00:43:03 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DDEC0996B6854C0AA7D8D397BC3A13B1 Ref B: LON04EDGE0709 Ref C: 2024-03-19T00:43:03Z
date: Tue, 19 Mar 2024 00:43:02 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=30F269C166A564400B267D86678265CE
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=fadRIqhIvOLnmY9uU-IrvtEokZhQu0ehEw2YLviFCYU; domain=.bing.com; expires=Sun, 13-Apr-2025 00:43:03 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F88F0102A6F54185BC196694476FD5CB Ref B: LON04EDGE0709 Ref C: 2024-03-19T00:43:03Z
date: Tue, 19 Mar 2024 00:43:02 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=30F269C166A564400B267D86678265CE; MSPTC=fadRIqhIvOLnmY9uU-IrvtEokZhQu0ehEw2YLviFCYU
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 668B2FB4A4A7444DBF19B62701FE5A73 Ref B: LON04EDGE0709 Ref C: 2024-03-19T00:43:04Z
date: Tue, 19 Mar 2024 00:43:04 GMT
-
Remote address:8.8.8.8:53Request229.211.149.34.in-addr.arpaIN PTRResponse229.211.149.34.in-addr.arpaIN PTR22921114934bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request74.19.199.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request74.19.199.152.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request104.241.123.92.in-addr.arpaIN PTRResponse104.241.123.92.in-addr.arpaIN PTRa92-123-241-104deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request211.135.221.88.in-addr.arpaIN PTRResponse211.135.221.88.in-addr.arpaIN PTRa88-221-135-211deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request211.135.221.88.in-addr.arpaIN PTRResponse211.135.221.88.in-addr.arpaIN PTRa88-221-135-211deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request61.179.17.96.in-addr.arpaIN PTRResponse61.179.17.96.in-addr.arpaIN PTRa96-17-179-61deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request61.179.17.96.in-addr.arpaIN PTRResponse61.179.17.96.in-addr.arpaIN PTRa96-17-179-61deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388213_1WCQ3PJBBE0FIXEBL&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239339388213_1WCQ3PJBBE0FIXEBL&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 78844
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BE4D61B210F14C0B88E056608197FF3A Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 89146
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 65FC435DEFD94577B5BB50E52F2F788F Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388212_1DTNU2NAFQGIU7JBO&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239339388212_1DTNU2NAFQGIU7JBO&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 431671
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0F2121575B104711A20ECCB1CE3179FB Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 369915
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D7AE3336768B4A0DB2F6DBDAF7A737A7 Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301142_11TUY2FDIIUV7WQCS&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301142_11TUY2FDIIUV7WQCS&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 245707
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0B992A3266C345D5A9A63BF994557B20 Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301551_1UO3JMUZBU5945BZN&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301551_1UO3JMUZBU5945BZN&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 305608
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E9747F42EE5644C19B59D74EFAC1B180 Ref B: LON04EDGE0606 Ref C: 2024-03-19T00:44:42Z
date: Tue, 19 Mar 2024 00:44:41 GMT
-
159.65.253.100:80http://www.fenomen-games.com/downloader/start4.htm?subscribe=1httpd4c7593d7fbcb92ff13045613c48e4cd.exe613 B 584 B 6 5
HTTP Request
GET http://www.fenomen-games.com/downloader/start4.htm?subscribe=1HTTP Response
404 -
151.101.3.10:80http://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2httpmsedge.exe812 B 620 B 6 5
HTTP Request
GET http://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2HTTP Response
301 -
288 B 260 B 6 5
-
151.101.3.10:443https://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2tls, http2msedge.exe1.8kB 5.8kB 13 14
HTTP Request
GET https://www.bigfishgames.com/download-games/1305/mystery-case-files-ravenhearst/download.html?afcode=af628d3a27a2HTTP Response
302 -
34.149.211.229:443https://downloads.bigfishgames.com/mystery-case-files-ravenhearst_s1_l1_gF1331T1L1_d3305658939.exe?gameWID=F1331T1L1&downloadID=3305658939&siteID=1&langID=1&type=gminstallertls, http2msedge.exe9.1kB 258.5kB 145 247
HTTP Request
GET https://downloads.bigfishgames.com/mystery-case-files-ravenhearst_s1_l1_gF1331T1L1_d3305658939.exe?gameWID=F1331T1L1&downloadID=3305658939&siteID=1&langID=1&type=gminstaller -
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=tls, http22.4kB 12.0kB 25 20
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=7efb74ca0efd4475baeb41e9320eaae2&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204 -
1.2kB 8.1kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301551_1UO3JMUZBU5945BZN&pid=21.2&w=1080&h=1920&c=4tls, http259.1kB 1.6MB 1162 1160
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388213_1WCQ3PJBBE0FIXEBL&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388212_1DTNU2NAFQGIU7JBO&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301142_11TUY2FDIIUV7WQCS&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301551_1UO3JMUZBU5945BZN&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 16 14
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
67 B 83 B 1 1
DNS Request
www.fenomen-games.com
DNS Response
159.65.253.100
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
73 B 104 B 1 1
DNS Request
100.253.65.159.in-addr.arpa
-
66 B 200 B 1 1
DNS Request
www.bigfishgames.com
DNS Response
151.101.3.10151.101.67.10151.101.131.10151.101.195.10
-
71 B 131 B 1 1
DNS Request
10.3.101.151.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
45.179.17.96.in-addr.arpa
-
72 B 88 B 1 1
DNS Request
downloads.bigfishgames.com
DNS Response
34.149.211.229
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
73 B 126 B 1 1
DNS Request
229.211.149.34.in-addr.arpa
-
144 B 143 B 2 1
DNS Request
74.19.199.152.in-addr.arpa
DNS Request
74.19.199.152.in-addr.arpa
-
465 B 7
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
196.249.167.52.in-addr.arpa
DNS Request
196.249.167.52.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
198.187.3.20.in-addr.arpa
DNS Request
198.187.3.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
79.121.231.20.in-addr.arpa
DNS Request
79.121.231.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
104.241.123.92.in-addr.arpa
-
144 B 316 B 2 2
DNS Request
119.110.54.20.in-addr.arpa
DNS Request
119.110.54.20.in-addr.arpa
-
146 B 278 B 2 2
DNS Request
217.135.221.88.in-addr.arpa
DNS Request
217.135.221.88.in-addr.arpa
-
140 B 312 B 2 2
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
-
146 B 278 B 2 2
DNS Request
211.135.221.88.in-addr.arpa
DNS Request
211.135.221.88.in-addr.arpa
-
142 B 270 B 2 2
DNS Request
61.179.17.96.in-addr.arpa
DNS Request
61.179.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
144 B 316 B 2 2
DNS Request
19.229.111.52.in-addr.arpa
DNS Request
19.229.111.52.in-addr.arpa
-
124 B 346 B 2 2
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
DNS Response
204.79.197.20013.107.21.200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
393B
MD515e1378becaea2b06b5257d4a5fa62e9
SHA1baff2300e206d7e2a3e3312550852110821fb967
SHA256bd93751c0495ca0f9b5bd95413ef604ae99bc4edc77485368188ec967fd6f358
SHA512a027de0a6041d18706527252c24697ffe1d8259ea674bbca1121523f4dab7ea27fdc8a6b3d0d38009c0811738ae3919c04bec251d146a56ecfab3ab74484d20c
-
Filesize
6KB
MD5dc795e382f10c777453eaa3cb21eee4d
SHA1b8ec638ff33a8f04d17dc40697d7d6d5c0b76ebe
SHA256430b5d068fd287b2c58aab3adbfcd06356ece3695e2eb5ff0b26f1babab6dcf4
SHA5125775d501913b77b6f2922fb0d267a21fd39de77c32020bec34b92ed842508d54466d4c0a2573571149dd3c18331574efbf4d1ded2493d5d4f8668d4d48478aaa
-
Filesize
6KB
MD5941a002a389eb6e35715c45774618c4e
SHA107b595c38933101434af357b48b7dd27eefd8d48
SHA256af1631550bcad7cc86b03f79c68931222bf920c5b1ed58fc88a04fa61e0cf275
SHA5127a06121ad5d56b77b993f97c353c398b2d4c2e26b8199299011a4a8a826ba87b8fa08674d4b2d6ceeca24ad2cd761dcb20728c997b931789472e5d882d299c53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51cbb18a80429e77562fe5796197c2387
SHA11348fd8ed3b7c2710da8d937d80db4fcbe411907
SHA2569b3803adbad49d306ab80cf27094a563a373a2cc3324af670328de4592f91dde
SHA512371154280bddf86ac9fde5c642e44ada65337d46033ebf2d5b058ba9d9f9eb06cd6bd829a4c8f9bee36b3811c64feb2f7306b776a585f69fd892c6ac4ee81389
-
Filesize
192B
MD5b32e479bd009ed83990c9673269a8679
SHA1c90602796792d73b8e14df593d28c88639957537
SHA2564da0710275fe2edc624ceae921dfed794450221c88daaac73467fc885cff1a3b
SHA512d29415020d7ddc493ac36ad2351414523f9804f3031a50c6bfded58d8b9a83f13877ae73571e9dcc50eedd7014230196313dfab8618e587e118ae6ba4d94db12
-
Filesize
1KB
MD5a4bd461ab4beb5521ab483be7f8b84c6
SHA16ef97d662484d81ec0777472b7866cbf1dcbd7d5
SHA2569a136e7bd6022cc073f7b79768a686f6b3dec96a02b49c8d8d71e3ae21d28a2b
SHA5123c5daee71cefc11b08a5e558e4e2f4b3c16326d05fe565566c20bca8d4cc5f2312759c4faaeb2c46f19c5a0b14839a02f9d3806c1a07505159340e4334e2959f